Method and device for managing WPI cipher key in 802.11 chips

A key and chip technology, applied in the field of managing WPI keys in 802.11 chips, can solve problems such as occupying a large storage space, achieve efficient acquisition, realize pipeline processing, and reduce the effect of on-chip cache

Inactive Publication Date: 2008-01-30
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the BSS/IBSS design capacity is larg

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for managing WPI cipher key in 802.11 chips
  • Method and device for managing WPI cipher key in 802.11 chips

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0064] Specific implementation plan

[0065] Please refer to Figure 2, which describes the structure of an 802.11 MAC system that implements WPI functions.

[0066] The components of the 802.11 MAC system with WPI function include: an 802.11 MAC hardware responsible for implementing the 802.11 MAC protocol; an off-chip memory for storing data. In the present invention, a unicast key table and a multicast key table Store here. In the 802.11 MAC device, it contains a WPI-related register group for realizing WPI key storage and state storage; it contains a WPI encryption and decryption module for WPI encryption and decryption; it contains an 802.11 protocol module for processing protocols; It also contains some other modules.

[0067] The unicast key table, the multicast key table, the WPI related register group, the member index table on the IO interface and the key table base address together constitute the WPI key management module.

[0068] Please refer to Figure 3, which describ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device used for effectively managing WPI secrete key in an 802.11 MAC hardware. A secrete key needed in WPI process comprises an encryption secrete key and a calibration secrete key. When MPDU is encrypted and decrypted, a data grouping number PN attached to the secrete key is needed; WPI secrete key can be updated during processing, PN is also needs to be updated during updating; an old secrete key is invalidated only after a new secrete key is activated; as STA, in the basic structure BSS, MAC hardware only needs to store the secrete key of the MAC but in IBSS or when MAC hardware works as AP, all STA secrete keys and PN in network need to be managed. When the secrete key is updated, two secrete keys and PN are simultaneously kept for the STA. When the data protected by WPI is received or sent, the data needs to be cached till the needed secrete key and the PN are got. The invention resolves the problem that MAC hardware must effectively manage a great amount of WPI secrete keys, thus avoiding occupying memory inside tablets, storing and getting the secrete key in a simple and quick way, realizing fluidization processing of data, reducing cashing inside tablets and decreasing realization difficulty and cost.

Description

technical field [0001] The invention relates to the field of wireless network communication, in particular to a method and device for managing WPI keys in 802.11 chips. Background technique [0002] my country put forward the national standard GB15629.11 of WLAN in May 2003, which is the only approved agreement in this field in our country. The standard includes a new WAPI (WLAN Authentication and Privacy Infrastructure) security mechanism, which consists of two parts: WAI (WLAN Authentication Infrastructure) and WPI (WLAN Privacy Infrastructure). The transmitted data is encrypted. [0003] WAI adopts the public key cryptographic system and uses certificates to authenticate STAs and APs in the WLAN system. After the identity of STA and AP are authenticated successfully, the two parties will conduct key negotiation, and carry out the WPI process according to the negotiated key. [0004] The WAPI specification defines three entities: [0005] 1) Authenticator Entity AE (Au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 梅张雄兰天
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products